CyberArk Password Vault Web Access - SAML My Page SSO Configuration - RSA Ready Implementation Guide
Originally Published: 2021-10-07
This article describes how to integrate CyberArk Password Vault Web Access (PVWA) with RSA Cloud Authentication Service using My Page SSO.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA using My Page SSO.
Procedure
- Sign in to RSA Cloud Administration Console and browse to Applications > Application Catalog.
- Click Create From Template and select SAML Direct.
- On the Basic Information page, choose Cloud.
- Enter the name for the application and click Next Step.
- On the Connection Profile page, navigate to the Initiate SAML Workflow section and choose IdP-initiated.
- Scroll down to the Service Provider section and enter the following details:
- ACS URL: Replace the <hostname> part in the URL to match actual hostname CyberArk uses for PVWA.
- Service Provider Entity ID: Entity ID for CyberArk PVWA.
- Scroll down to the Identity Provider section and make a note of the Identity Provider URL, which is required for the CyberArk PVWA configuration.
- Under Show IdP Advanced Configuration, proceed with the Default option for Identity Provider Entity ID and Audience for SAML Response.
- Under Message Protection, in the SAML Response Protection section, choose IdP signs assertion within response.
- Download the certificate by clicking Download Certificate.
- Scroll down to the User Identity section and select the following:
- Identifier Type: Auto Detect
- Property: Auto Detect
- Click Next Step.
- In the Access Policy section, choose the policy for the application in the drop-down list.
- Click Next Step and click Save and Finish.
- Click Publish Changes and wait for the operation to be completed.
Your application is now enabled for SSO.
Configure CyberArk PVWA
Perform these steps to configure CyberArk PVWA.
Procedure
- In the PasswordVault folder (default location is inetpub > wwwroot > PasswordVault) make a copy of the saml.config.template file and rename it to saml.config.
- Edit the saml.config file with the following parameters:
- ServiceProvider Name: Service Provider Entity ID set in step 6 of the RSA configuration section.
- PartnerIdentityProvider Name: Identity Provider URL obtained in step 7 of the RSA configuration section.
- SingleSignOnServiceUrl: Identity Provider URL obtained in step 7 of the RSA configuration section.
- Certificate: The base 64 text representation of the certificate that is downloaded from the RSA configuration section.
- In the command prompt, run iisreset.
- Log on to Password Vault Web Access as an administrator.
- Navigate to Administration > Configuration Options > Options.
- Expand Authentication Methods and select saml.
- Set the Enabled option to Yes and update the DisplayName field to reflect what will be shown to the users.
- Click Apply.
- In the Options pane, right-click Access Restriction, and then select Add AllowedReferrer.
- In the Allowed Referrer property, in BaseUrl, specify base URL part of the Identity Provider URL from the RSA configuration.
- Click Apply.
- Sign out of PVWA.
The configuration is complete.
Return to CyberArk Password Vault Web Access - RSA Ready Implementation Guide.
Related Articles
CyberArk Password Vault Web Access - RSA Ready Implementation Guide 203Number of Views CyberArk Password Vault Web Access - SAML Relying Party Configuration - RSA Ready Implementation Guide 44Number of Views CyberArk Vault - RSA Ready Implementation Guide 14Number of Views Microsoft Office 365 - SAML My Page SSO Configuration - RSA Ready Implementation Guide 117Number of Views RSA SecurID Access Free Trial CyberArk PVWA Guide 49Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?